Working the kinks out of your supply chain

Resilience, speed and visibility. Those are three magic words that make any supply chain manager's ears perk up.

And Scott Byrnes can explain the connections between them. Byrnes is vice president of marketing at Amber Road, which makes software to manage global trading, and he has interesting tales to tell about how customers are looking at their supply chains today, given the ever-more-interconnected nature of commerce.

"Think of the flooding in Thailand, the volcano in Iceland and the tsunami in Japan. Those three things shut down a lot of people's supply chains," Byrnes says.

"A disaster in what might formerly be considered a remote part of the world now impacts everybody."

As a result, resilience has risen up the ladder of corporate concerns, with manufacturers and buyers looking to diversify their supplier bases and modes of transportation.

FREE: Download CSOonline's Ultimate Guide to Business Continuity now! [11 page PDF free Insider registration is required]

When the Eyjafjallajokull volcano erupted in April 2010, critical air routes around Europe were closed. "The companies that responded fastest secured the excess [alternative] transportation capacity--by rail, for example--that was available. So the leaders locked those channels down pretty quickly and shut everybody else out," Byrnes says.

When it comes to getting visibility into process, Byrnes relates the story of one pharmaceuticals company that started looking into supply chain problems in regards to customer service problems.

The company found that a number of its supply chain partners were consistently providing inflated lead times--a common practice that suppliers use to avoid missing deadlines or being unable to meet a spike in demand. However, the result for the pharmaceutical company was an extra $100M million of inventory stuffed in the chain. (This is called the "bullwhip effect," in industry-speak.)

Initiatives that improve security in the supply chain can often yield other business benefits. (See, for example, How to Improve Supply Chain Security (The Trick Is to Keep It Moving), from CSO's special Global Security issue back in 2004. The concepts still apply.)

Join the CSO newsletter!

Error: Please check your email address.

Tags security

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Derek Slater

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts